You limited your search to:

 Collection: Congressional Research Service Reports
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: April 22, 2003
Creator: Kruger, Lennard G
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Immigration: A Guide to Internet Sources

Immigration: A Guide to Internet Sources

Date: September 9, 2004
Creator: Torreon, Barbara Salazar
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Broadband Internet Regulation and Access: Background and Issues

Broadband Internet Regulation and Access: Background and Issues

Date: January 26, 2006
Creator: Gilroy, Angele A & Kruger, Lennard G
Description: This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: February 21, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: April 23, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Immigration: A Guide to Internet Sources

Immigration: A Guide to Internet Sources

Date: June 11, 2003
Creator: Salazar, Barbara A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Critical Infrastructure: Control Systems and the Terrorist Threat

Critical Infrastructure: Control Systems and the Terrorist Threat

Date: July 14, 2003
Creator: Shea, Dana A
Description: This report addresses the cyber-vulnerability of critical infrastructure industries which regularly use industrial control systems. Industrial control systems may be vulnerable to infiltration by different routes, including wireless transmission, direct access to control system computers, exploitation of dial-up modems used for maintenance, or through the Internet. This report will specifically discuss the potential for access to industrial control systems through the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Treatment Technologies at Superfund Sites

Treatment Technologies at Superfund Sites

Date: June 27, 1991
Creator: Wozniak, Alborz A & Reisch, Mark
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress

Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress

Date: May 30, 2006
Creator: O'Rourke, Ronald
Description: Programs for implementing network-centric warfare (NCW) in the Navy include the Cooperative Engagement Capability (CEC), the IT-21 program, and FORCEnet. A related program is the Navy-Marine Corps Intranet (NMCI). Congress has expressed concern for some of these programs, particularly NMCI.
Contributing Partner: UNT Libraries Government Documents Department
Spyware: Background and Policy Issues for Congress

Spyware: Background and Policy Issues for Congress

Date: January 26, 2005
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department